Enterprise

Cyber Hygiene Analytics module

DescriptionAvailability
Basic InsightsAdvanced Insights
IdentifySmart Device Inventory

Analytics Dashboards

 

Continuously monitor, track and report on the control coverage of devices identified from connected data sources.

 

IncludedAvailable
Control Coverage

Analytics Dashboards

 

Continuously monitor, track and report on the coverage of security controls.

 

IncludedAvailable
ProtectIdentity and Access Management Analytics Dashboards

 

Continuously monitor, track and report on the assignment, use and appropriateness of system and application accounts.IncludedDetails upon request
Configuration Management Analytics Dashboards

 

Continuously monitor, track and report on alignment/deviation from standard secure configurations.

 

Details upon requestDetails upon request
Privileged Access Management Analytics Dashboards

 

Continuously monitor, track and report on the assignment, use and appropriateness of administrative privileges.

 

Details upon requestDetails upon request
Data Loss Prevention Analytics Dashboards

 

Continuously monitor, track and report on the tools and processes used to prevent data loss.

 

Details upon requestDetails upon request
Phishing Awareness Training Analytics Dashboards

 

Continuously monitor, track and report on the tools and processes used to conduct phishing awareness training.

 

IncludedDetails upon request
DetectVulnerability & Patch Management Analytics Dashboards

 

Continuously monitor, track and report on the vulnerability and patch performance of devices in the inventory.

 

IncludedAvailable
Malware Defences Analytics DashboardsContinuously monitor, track and report on the installation, configuration and operational effectiveness of anti-malware solutions.

 

IncludedDetails upon request
Application Security Analytics Dashboards

 

Continuously monitor, track and report on the Application security vulnerability program.

 

IncludedDetails upon request
 Device Viewer

Entity Search and Analytics

 

Search and view devices to understand the value at risk at the entity level. Pivot to associated vulnerabilities or users.

 

Available
 Vulnerability Viewer

Entity Search and Analytics

 

Search and view details for individual vulnerabilities and associated devices, users and applications.

 

Details upon request